Security software - Expert commentary

Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common...

How A Push For Efficiency Can Be A Boon For Security Integrators In 2024

As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building secu...

Strengthening Retail Security: Strategies To Combat The Surging Shoplifting Epidemic

Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023,​ where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concer...

How Security Gets Real With Remote Guarding

The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose.  Future of overnight security Smart business owners are starting to realize, however, that some of these traditional security measures are becoming...

Exploring Evolving Trends In Data Security: Unveiling Key Developments

It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data se...

The Evolving Role Of Access Control In Healthcare

Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications.  From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physi...

Bridging The Consumption Gap: A Guide For Systems Integrators

Security systems represent a significant investment, yet many organizations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control, and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance, or drive operational efficiencies.  Consumption ga...

Mastering Transportation Cybersecurity: The Comprehensive Guide

Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply cha...

The Importance Of Machine Authentication In Plant Safety And Security

Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authentication is often a missing link in the security plan for manufacturers. Why machine authentication?  Most manufacturers have made significant investments in physical access control (PAC) for production facilities. Few shops currently hand out physical keys to employees or leave the building...

Efficacious K-12 Solutions In A Challenging, Fluid World

Mass attacks continue to lead the news far too often. All are horrific and disturbing, but the heartbreaking tragedies that have unfolded on school campuses touch us the deepest and have the most profound effects on our communities. NTAC statistics According to a January 2023 report from the United States Secret Service National Threat Assessment Center (NTAC), K-12 events accounted for 6% of all mass attacks in public and semi-public spaces between 2016 and 2020. 6% may strike some as being...

Enhancing Visitor Management Through Access Control

Organizations of all types have made it a priority to better track who is coming and going inside their facilities and on their property. This can include an HVAC technician who needs to be inside a building for several hours to fix a faulty air conditioning unit or a parent who volunteers each week in their child’s school. Technology-based visitor management With considerable advancements in visitor management systems in recent years, organizations are now benefiting from technology-b...

Why The Term “Security Team” Is Too Limiting

There’s been a long history of people thinking of “gates, guards, and guns” when referring to physical security. And for a long time, this was the norm. When analog cameras required significant amounts of wiring and a dedicated guard to watch said feeds (think about any action movie from the 90s), the assumption was that security was protecting assets, but had little to do with the overall business.  Defining security with recent advancements Fast forward to more recen...

Reinventing Security Integrators To Weather Macroeconomic Headwinds

We work with and buy from “middlemen” all the time, yet the term remains loaded with negative connotations. It’s telling that the term remains gendered, no one has tried very hard to normalize the term “middleperson” in the same way as “chairperson” or “police officer.” Why? It’s easy to see a middleman as an inconvenience, someone who skims profit off the top while offering no real value to the end customer. Think of the second-hand c...

Critical Infrastructure: The Starting Point For Surveillance

Inadequate security measures on your essential infrastructure can have severe consequences.  Consequences  Consider the rail industry: If a vandal cuts the cables on a vital mechanism that controls train signals, train safety is jeopardized. To avoid train collisions or derailments and thus significant damage to property and potential loss of life, the operating company must shut down the service until the infrastructure is repaired and the network is up and running again. The disru...

Aesthetic Access Control: Finding The Balance

Where access control is concerned, architects and design teams must find the right balance between aesthetics, functionality and security, says Daniel May of Consort Architectural Hardware. Following a period of innovation and integration, access control has developed into an ever-prominent facet of building design over the past decade. Where systems were once rudimentary, modern user requirements have led to several operational and technological advancements, resulting in a versatile selection...

Why Safeguarding Charging Stations Is Critical To The Safety Of The Population As A Whole?

The promise of electric vehicles is closer to reality than ever before. New plans and investments at the federal level designate billions of dollars to move our country toward clean energy, including $2 million to help auto manufacturers retool facilities to increase EV production. Additionally, the Biden Administration has announced a goal to create 100% carbon-free electricity by 2035 and a net-zero carbon economy by 2050. Domestic EV marketplace The domestic EV marketplace has grown from...

DevSecOps Is A ‘Business Priority’

DevSecOps is a vital strategy with automated security included in every phase of software development. Implementing DevSecOps means application and infrastructure security becomes a shared responsibility amongst the development, operations, and security teams which maximizes protection at every level of the organization.  Investing in DevSecOps strategies According to a recent report conducted by the Neustar International Security Council (NISC), an elite group of cybersecurity professi...

5 Advantages Of Using A Malware Sandbox As Part Of Your Cyber Security Strategy

The number of cyber attacks around the world has been steadily increasing year after year; for example, in 2022, the weekly rate of attacks on corporate networks was 38% higher than in 2021. The potential financial losses of a data breach are substantial, with IBM's report putting the average cost at $4.35M. In order to reduce incidents quickly, organizations must take action and prevent them from happening in the first place. And using an interactive malware sandbox is a cost-effective and sim...

Top Security Measures To Consider When Protecting Businesses, Infrastructure, And Public Attractions

Are we doing enough to protect our vital infrastructure and commercial properties? This is one of the key issues the sector is currently dealing with. Crime rates have been rising following the pandemic and ensuing lockdowns in 2020–21. The Office for National Statistics reported that between September 2019 and September 2021, crime rates increased by 14%. This illustrates that risks to businesses, public attractions, and public buildings are increasing, and it implies that decision-make...

4 Trends To Follow At ISC West

The security industry is going increasingly digital these days, with more small- and medium-sized businesses joining their global brethren by moving their data to the cloud, leveraging the benefits of artificial intelligence, and embracing more open solutions. Innovation is expected to continue at a rapid pace, thanks in part to the residual effects of the pandemic which has driven changes that might have otherwise taken five years or a decade or more to get into customers’ hands on a glo...

“The Potential Is Enormous” - Interview With Dr. Henrik Siegle, CTO At Bosch Building Technologies

Dr. Henrik Siegle has been the CTO at Bosch Building Technologies since November 2021. In this interview, he speaks about the megatrends of energy efficiency and sustainability, and about new developments in the building technology sector. Dr. Siegle, the building industry is currently facing major challenges in the form of climate change and energy shortages. How is Bosch Building Technologies dealing with these challenges? Dr. Henrik Siegle: Energy efficiency and sustainability have long...

Protecting Privacy: Tackling The Oncoming Wave Of Marketing Data Regulation

The nuances of data privacy continue to bombard organizations from all angles, and, amid the impending sunset of Universal Analytics (UA), it’s time to stop playing catch-up. Instead, by enacting future-proofing strategies around data as a first port of call, long-term compliance can be achieved as an automatic byproduct. Data privacy At data privacy’s ‘sunrise’, companies’ efforts were largely targeted towards the customer, ensuring that the ever-growing extent o...

The Only Guarantee: Data Growth – Can Your Infrastructure Keep Up?

Video surveillance has become the king of data—and is known to be the largest producer of data in the world. A single day of video surveillance is estimated to produce more than 500 petabytes of data—for context, a single petabyte is equivalent to 1,000 terabytes – and that number is only expected to grow. Why is it expected to grow? The answer lies with new and emerging technology, and the way that technology operates. For physical security teams, the rapid amount of data the...

Jackson Fencing Presents Tips To Protect A Place From Burglary

We believe in integrated security solutions, so while a solid gate could prevent sight lines from the house, combining it with other measures such as alarms, motion sensing lighting, and CCTV will allow a good level of surveillance to keep you and your valuables safe. Burglary prevention tips Very few burglars are opportunists; instead, they may be regularly scanning and looking for weaknesses to capitalize on. It is therefore crucial never to give a burglar an opportunity to strike. Of cours...

A Beginner’s Guide To Smart Home Security

Residential burglaries and break-ins are a problem for many homeowners. The FBI estimates there were approximately 1,117,696 burglaries in 2019 in the United States, which accounted for 16.1% of property crimes. Having proper home security can not only protect your home and belongings, but it can also keep your family safe. Even if you’re new to the idea of having and using smart home security devices, it’s easy to get started. This guide will provide the information and actionable...

Workplace Safety In The Security Industry - Things To Keep In Mind

For both employers and employees, a safe workplace is crucial. But what about the security of those who keep us safe? Worker safety The physical security industry and its personnel are not only valuable but also indispensable assets in workplaces. Most private and public sectors rely on it to keep their respective communities and stakeholders safe. Hence, it is extremely crucial to ensure the safety of physical security workers. The security industry, regardless of size, must prioritize safet...

Want Cyber Insurance? Better Get Patching!

Managing the technology stack and known vulnerabilities is becoming a key criteria for cyber insurance pay outs. Open source software has once again made the headlines following warnings to organizations about the release of a new version of OpenSSL. Released on 1st November 2022, the new version patched vulnerabilities in version 3.0 and above of the nearly ubiquitously used cryptographic library for encrypting communications on the Internet. Remote code execution The OpenSSL Project team to...

Why Insider Threats Will Rise In 2023 (and How To Fight Them)

Two trends in recent years are combining to exacerbate insider threat risks at companies. First, companies continue to foster cultures of openness and collaboration that often run contrary to the needs of a security-oriented mindset. Second, the mainstreaming of hybrid work has made companies’ control over data and device usage during work more tenuous. Addressing insider threats We’ve seen repeatedly that companies have the tools, structural choices, and decision-making power acro...

Door Security Trends: The Path Forward

The outlook for advancements in door security solutions is proving to be an extension of the positive trends that have emerged over the past few years and that continue to evolve in exciting new ways. That’s a good sign as we make our way along the road toward an ever-safer world. Improvements in a hybrid workforce  Here’s what we’re seeing: More and more companies are rethinking the office space and how electronic access control (EAC) security and data can help better s...

Security Considerations For RFID And Mobile Access

In recent years, multinational corporations such as Cathay Pacific, Facebook, Uber, and numerous others have been heavily fined due to security and data protection violations. This period has seen data protection laws increase as more and more information is gathered and shared online. As such, it becomes crucial to account for security capabilities when choosing an embedded device that touches potentially sensitive data. RFID readers RFID readers very much belong to the ecosystem wherein per...